syzbot


KASAN: slab-use-after-free Read in rose_send_frame

Status: upstream: reported on 2026/04/24 16:53
Reported-by: syzbot+62bee3378a795d9af3ec@syzkaller.appspotmail.com
First crash: 1d11h, last: 1d11h
Similar bugs (3)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream KASAN: slab-use-after-free Write in rose_send_frame hams 22 26 3d14h 100d 0/29 upstream: reported on 2026/01/15 20:15
upstream general protection fault in rose_send_frame (2) hams 2 7 1270d 1294d 22/29 fixed on 2023/02/24 13:50
linux-6.1 KASAN: use-after-free Read in rose_send_frame 22 3 94d 202d 0/3 upstream: reported on 2025/10/05 19:28

Sample crash report:
==================================================================
BUG: KASAN: slab-use-after-free in rose_send_frame+0x73/0x220 net/rose/rose_link.c:101
Read of size 8 at addr ffff88802f643020 by task syz-executor/8815

CPU: 0 PID: 8815 Comm: syz-executor Not tainted syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026
Call Trace:
 <IRQ>
 dump_stack_lvl+0x18c/0x250 lib/dump_stack.c:106
 print_address_description mm/kasan/report.c:364 [inline]
 print_report+0xa8/0x210 mm/kasan/report.c:468
 kasan_report+0x117/0x150 mm/kasan/report.c:581
 rose_send_frame+0x73/0x220 net/rose/rose_link.c:101
 rose_transmit_restart_request net/rose/rose_link.c:198 [inline]
 rose_t0timer_expiry+0x143/0x350 net/rose/rose_link.c:83
 call_timer_fn+0x189/0x540 kernel/time/timer.c:1701
 expire_timers kernel/time/timer.c:1752 [inline]
 __run_timers+0x542/0x800 kernel/time/timer.c:2023
 run_timer_softirq+0x67/0xf0 kernel/time/timer.c:2036
 handle_softirqs+0x280/0x820 kernel/softirq.c:578
 __do_softirq kernel/softirq.c:612 [inline]
 invoke_softirq kernel/softirq.c:452 [inline]
 __irq_exit_rcu+0xd3/0x190 kernel/softirq.c:661
 irq_exit_rcu+0x9/0x20 kernel/softirq.c:673
 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1088 [inline]
 sysvec_apic_timer_interrupt+0xa4/0xc0 arch/x86/kernel/apic/apic.c:1088
 </IRQ>
 <TASK>
 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:687
RIP: 0010:lock_acquire+0x208/0x420 kernel/locking/lockdep.c:5758
Code: f7 84 24 80 00 00 00 00 02 00 00 43 c6 44 3c 04 f8 0f 85 f0 00 00 00 41 f7 c6 00 02 00 00 74 01 fb 48 c7 44 24 60 0e 36 e0 45 <4b> c7 04 3c 00 00 00 00 43 c7 44 3c 08 00 00 00 00 65 48 8b 04 25
RSP: 0018:ffffc90003387220 EFLAGS: 00000206
RAX: 0000000000000001 RBX: 0000000000000000 RCX: 7ccf78be14dbea00
RDX: 0000000000000000 RSI: ffffffff8acadb60 RDI: ffffffff8b1c8e60
RBP: ffffc90003387330 R08: dffffc0000000000 R09: 1ffffffff2238aa0
R10: dffffc0000000000 R11: fffffbfff2238aa1 R12: 1ffff92000670e50
R13: ffffffff8d1320e0 R14: 0000000000000246 R15: dffffc0000000000
 rcu_lock_acquire include/linux/rcupdate.h:334 [inline]
 rcu_read_lock include/linux/rcupdate.h:786 [inline]
 is_bpf_text_address+0x47/0x2a0 kernel/bpf/core.c:741
 kernel_text_address+0xa0/0xd0 kernel/extable.c:125
 __kernel_text_address+0xd/0x30 kernel/extable.c:79
 unwind_get_return_address+0x5d/0xc0 arch/x86/kernel/unwind_orc.c:369
 arch_stack_walk+0x11d/0x190 arch/x86/kernel/stacktrace.c:26
 stack_trace_save+0xaa/0x100 kernel/stacktrace.c:122
 save_stack+0x125/0x230 mm/page_owner.c:128
 __reset_page_owner+0x4e/0x190 mm/page_owner.c:149
 reset_page_owner include/linux/page_owner.h:24 [inline]
 free_pages_prepare mm/page_alloc.c:1181 [inline]
 free_unref_page_prepare+0x7b2/0x8c0 mm/page_alloc.c:2365
 free_unref_page_list+0xbe/0x860 mm/page_alloc.c:2504
 release_pages+0x1f7a/0x2200 mm/swap.c:1022
 __folio_batch_release+0x71/0xe0 mm/swap.c:1042
 folio_batch_release include/linux/pagevec.h:83 [inline]
 shmem_undo_range+0x630/0x1b20 mm/shmem.c:1026
 shmem_truncate_range mm/shmem.c:1135 [inline]
 shmem_evict_inode+0x245/0x9e0 mm/shmem.c:1264
 evict+0x4ca/0x8d0 fs/inode.c:705
 do_unlinkat+0x38c/0x590 fs/namei.c:4406
 __do_sys_unlink fs/namei.c:4447 [inline]
 __se_sys_unlink fs/namei.c:4445 [inline]
 __x64_sys_unlink+0x49/0x50 fs/namei.c:4445
 do_syscall_x64 arch/x86/entry/common.c:46 [inline]
 do_syscall_64+0x55/0xa0 arch/x86/entry/common.c:76
 entry_SYSCALL_64_after_hwframe+0x68/0xd2
RIP: 0033:0x7f833559bec7
Code: 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 57 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 01 c3 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8
RSP: 002b:00007ffd963a1ae8 EFLAGS: 00000206 ORIG_RAX: 0000000000000057
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f833559bec7
RDX: 00007ffd963a1b10 RSI: 00007ffd963a1ba0 RDI: 00007ffd963a1ba0
RBP: 00007ffd963a1ba0 R08: 00007ffd963a2ba0 R09: 00000000ffffffff
R10: 0000000000000100 R11: 0000000000000206 R12: 00007ffd963a2c30
R13: 00007f8335632120 R14: 00000000000afb66 R15: 00007ffd963a2c70
 </TASK>

Allocated by task 5901:
 kasan_save_stack mm/kasan/common.c:46 [inline]
 kasan_set_track+0x4e/0x70 mm/kasan/common.c:53
 ____kasan_kmalloc mm/kasan/common.c:375 [inline]
 __kasan_kmalloc+0x8f/0xa0 mm/kasan/common.c:384
 kmalloc include/linux/slab.h:600 [inline]
 rose_add_node+0x23c/0xf00 net/rose/rose_route.c:85
 rose_rt_ioctl+0xd2c/0x1290 net/rose/rose_route.c:748
 rose_ioctl+0x3fc/0x8f0 net/rose/af_rose.c:1386
 sock_do_ioctl+0xfc/0x310 net/socket.c:1219
 sock_ioctl+0x5ba/0x7e0 net/socket.c:1340
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:871 [inline]
 __se_sys_ioctl+0xfd/0x170 fs/ioctl.c:857
 do_syscall_x64 arch/x86/entry/common.c:46 [inline]
 do_syscall_64+0x55/0xa0 arch/x86/entry/common.c:76
 entry_SYSCALL_64_after_hwframe+0x68/0xd2

Freed by task 28:
 kasan_save_stack mm/kasan/common.c:46 [inline]
 kasan_set_track+0x4e/0x70 mm/kasan/common.c:53
 kasan_save_free_info+0x2e/0x50 mm/kasan/generic.c:522
 ____kasan_slab_free+0x126/0x1e0 mm/kasan/common.c:237
 kasan_slab_free include/linux/kasan.h:164 [inline]
 slab_free_hook mm/slub.c:1811 [inline]
 slab_free_freelist_hook+0x130/0x1a0 mm/slub.c:1837
 slab_free mm/slub.c:3830 [inline]
 __kmem_cache_free+0xba/0x1e0 mm/slub.c:3843
 rose_neigh_put include/net/rose.h:166 [inline]
 rose_timer_expiry+0x4c6/0x5f0 net/rose/rose_timer.c:183
 call_timer_fn+0x189/0x540 kernel/time/timer.c:1701
 expire_timers kernel/time/timer.c:1752 [inline]
 __run_timers+0x542/0x800 kernel/time/timer.c:2023
 run_timer_softirq+0x67/0xf0 kernel/time/timer.c:2036
 handle_softirqs+0x280/0x820 kernel/softirq.c:578
 __do_softirq kernel/softirq.c:612 [inline]
 invoke_softirq kernel/softirq.c:452 [inline]
 __irq_exit_rcu+0xd3/0x190 kernel/softirq.c:661
 irq_exit_rcu+0x9/0x20 kernel/softirq.c:673
 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1088 [inline]
 sysvec_apic_timer_interrupt+0xa4/0xc0 arch/x86/kernel/apic/apic.c:1088
 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:687

The buggy address belongs to the object at ffff88802f643000
 which belongs to the cache kmalloc-512 of size 512
The buggy address is located 32 bytes inside of
 freed 512-byte region [ffff88802f643000, ffff88802f643200)

The buggy address belongs to the physical page:
page:ffffea0000bd9000 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2f640
head:ffffea0000bd9000 order:2 entire_mapcount:0 nr_pages_mapped:0 pincount:0
flags: 0xfff00000000840(slab|head|node=0|zone=1|lastcpupid=0x7ff)
page_type: 0xffffffff()
raw: 00fff00000000840 ffff888017c41c80 ffffea000092fa00 dead000000000002
raw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as allocated
page last allocated via order 2, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 4025, tgid 4025 (kworker/u4:2), ts 23921287009, free_ts 0
 set_page_owner include/linux/page_owner.h:31 [inline]
 post_alloc_hook+0x1c1/0x200 mm/page_alloc.c:1581
 prep_new_page mm/page_alloc.c:1588 [inline]
 get_page_from_freelist+0x1951/0x19e0 mm/page_alloc.c:3220
 __alloc_pages+0x1f0/0x460 mm/page_alloc.c:4500
 alloc_slab_page+0x5d/0x160 mm/slub.c:1881
 allocate_slab mm/slub.c:2028 [inline]
 new_slab+0x87/0x2d0 mm/slub.c:2081
 ___slab_alloc+0xc5d/0x12f0 mm/slub.c:3253
 __slab_alloc mm/slub.c:3339 [inline]
 __slab_alloc_node mm/slub.c:3392 [inline]
 slab_alloc_node mm/slub.c:3485 [inline]
 __kmem_cache_alloc_node+0x19e/0x250 mm/slub.c:3534
 kmalloc_trace+0x2a/0xe0 mm/slab_common.c:1098
 kmalloc include/linux/slab.h:600 [inline]
 kzalloc include/linux/slab.h:721 [inline]
 alloc_bprm+0x56/0x9b0 fs/exec.c:1538
 kernel_execve+0x98/0x9c0 fs/exec.c:2023
 call_usermodehelper_exec_async+0x20b/0x350 kernel/umh.c:110
 ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:152
 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:293
page_owner free stack trace missing

Memory state around the buggy address:
 ffff88802f642f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
 ffff88802f642f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
>ffff88802f643000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
                               ^
 ffff88802f643080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
 ffff88802f643100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
==================================================================
----------------
Code disassembly (best guess):
   0:	f7 84 24 80 00 00 00 	testl  $0x200,0x80(%rsp)
   7:	00 02 00 00
   b:	43 c6 44 3c 04 f8    	movb   $0xf8,0x4(%r12,%r15,1)
  11:	0f 85 f0 00 00 00    	jne    0x107
  17:	41 f7 c6 00 02 00 00 	test   $0x200,%r14d
  1e:	74 01                	je     0x21
  20:	fb                   	sti
  21:	48 c7 44 24 60 0e 36 	movq   $0x45e0360e,0x60(%rsp)
  28:	e0 45
* 2a:	4b c7 04 3c 00 00 00 	movq   $0x0,(%r12,%r15,1) <-- trapping instruction
  31:	00
  32:	43 c7 44 3c 08 00 00 	movl   $0x0,0x8(%r12,%r15,1)
  39:	00 00
  3b:	65                   	gs
  3c:	48                   	rex.W
  3d:	8b                   	.byte 0x8b
  3e:	04 25                	add    $0x25,%al

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2026/04/24 16:53 linux-6.6.y 9760bf04666d 1c2b9291 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-6-kasan KASAN: slab-use-after-free Read in rose_send_frame
* Struck through repros no longer work on HEAD.